Australia's leading source of security and threat news
These search results are from across the Techday Network of sites
Use of banking trojans up 50%, cryptomining still dominant malware – report
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Compromised websites spreading Chtonic banking trojan
Affected websites that use outdated versions of WordPress, Joomla and Squarespace content management systems may be compromised.
New Panda Banker campaign targets Japan's financial institutions
Popular banking malware Panda Banker, also known as PandaBot and Zeus Panda is reportedly targeting Japan’s financial institutions for the first time.
From Dridex to Friedex: Malware creators dabble in ransomware
The creators of the Dridex banking Trojan are also responsible for FriedEx (also known as BitPaymer), a ransomware that was discovered in mid-2017.
Ursnif banking Trojan loves New Zealand and Australia as its targets
The Ursnif Banking Trojan seems to love Australia and New Zealand, based on findings that show its ‘disproportionate prevalence' in the two countries.
2017’s threat landscape report shows ransomware epidemic
Cyberthreats have changed significantly in 2017 - Bitdefender's annual report shows one in six spam emails now contain some form of ransomware.
Number of malicious emails soars 85% from previous quarter
Proofpoint has released the findings from its massive Quarterly Threat Report – some of which are astonishing.
The crucial guide to deploying a SIEM solution successfully
SIEM solutions have far-reaching benefits, but Gartner says there are a lot of factors to consider to avoid disaster - here's the company's guide.
Whitepaper: How to make sure your security architecture keeps up with surging network speeds
The annual cost of cybercrime is expected to exceed US$6t by 2021 with a large contributor being the sheer amount of data that requires processing.
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?